{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T10:36:00Z","timestamp":1774694160366,"version":"3.50.1"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100002383","name":"Deanship of Scientific Research at King Saud University through the research group","doi-asserted-by":"publisher","award":["RG-1435-048"],"award-info":[{"award-number":["RG-1435-048"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671349"],"award-info":[{"award-number":["61671349"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2767561","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T18:08:39Z","timestamp":1509386919000},"page":"464-478","source":"Crossref","is-referenced-by-count":128,"title":["Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions"],"prefix":"10.1109","volume":"6","author":[{"given":"Muneeb Ahmed","family":"Sahi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2437-4870","authenticated-orcid":false,"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8062-3301","authenticated-orcid":false,"given":"Kashif","family":"Saleem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4701-1204","authenticated-orcid":false,"given":"Xiaodong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Abdelouahid","family":"Derhab","sequence":"additional","affiliation":[]},{"given":"Mehmet A.","family":"Orgun","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Imran","family":"Rashid","sequence":"additional","affiliation":[]},{"given":"Asif","family":"Yaseen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.5539\/gjhs.v9n3p157"},{"key":"ref72","first-page":"1696","article-title":"Big data in healthcare using cloud database with enhanced privacy","volume":"5","author":"lavanya","year":"2016","journal-title":"Int J Adv Res Comput Eng Technol"},{"key":"ref71","first-page":"123","article-title":"Healthcare in cloud using multi-level privacy-preserving patient self-controllable algorithm","volume":"1","author":"fatima","year":"2016","journal-title":"International Journal of Advanced trends in Science and Engineering"},{"key":"ref70","first-page":"1189","article-title":"Patients and healthcare providers&#x2019; perceptions towards privacy rights of patients: An investigation of listed Swiss participating hospitals","volume":"7","author":"ama-amadasun","year":"2016","journal-title":"Int J Sci Eng Res"},{"key":"ref76","author":"kumar","year":"2016","journal-title":"Tata Elxsi&#x2019;s Solution Suite for Tackling the Challenges for Wireless Technology in Healthcare"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2016.01.002"},{"key":"ref74","first-page":"202","article-title":"Information security culture in healthcare informatics: A preliminary investigation","volume":"88","author":"hassan","year":"2016","journal-title":"J Theor Appl Inf Technol"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1177\/1049732314552194"},{"key":"ref75","first-page":"909","article-title":"International journal of engineering sciences & research technology PSMPV: Patient self-controllable and multi-level privacy-protecting cooperative validation in distributed M-Healthcare cloud computing","volume":"5","author":"shaikh","year":"2016","journal-title":"Int J Sci Tech Res"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.366"},{"key":"ref33","author":"pfitzmann","year":"2005","journal-title":"Anonymity unlinkability unobservability pseudonymity and identity managementA consolidated proposal for terminology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.22"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2300846"},{"key":"ref37","first-page":"2001","article-title":"Pseudonymization in medical research&#x2014;The generic data protection concept of the TMF","volume":"1","author":"pommerening","year":"2005","journal-title":"GMS Medizinische Informatik Biometrie und Epidemiologie"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-13-75"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514526"},{"key":"ref34","article-title":"Pseudonym systems","author":"lysyanskaya","year":"1999","journal-title":"Selected Areas in Cryptography"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.hlpt.2015.08.007"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0509-2"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.387"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2015.12.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-016-0001-6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416352"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3390\/fi8030037"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.06.014"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.04.007"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.07.006"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAFRICA.2016.7530664"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/BHI.2016.7455821"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.376"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"22e","DOI":"10.2196\/jmir.3.2.e22","article-title":"What is e-health (2): The death of telemedicine?","volume":"3","author":"mea","year":"2001","journal-title":"J Med Internet Res"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security issues in healthcare applications using wireless medical sensor networks: A survey","volume":"12","author":"kumar","year":"2011","journal-title":"SENSORS"},{"key":"ref22","first-page":"645","article-title":"Security concerns in Android mHealth apps","author":"he","year":"2014","journal-title":"Proc Amer Med Inf Assoc Annu Symp"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.3672"},{"key":"ref24","year":"2015"},{"key":"ref23","year":"2016","journal-title":"The HealthVault Web-Based PHR"},{"key":"ref26","author":"cohn","year":"2006","journal-title":"Privacy and Confidentiality in the Nationwide Health Information Network"},{"key":"ref25","year":"2015"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.11.031"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.016"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ISB.2014.6990752"},{"key":"ref54","year":"2016","journal-title":"Trust Worthy Clouds (Tclouds)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.108"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICETC.2010.5529541"},{"key":"ref10","year":"2016"},{"key":"ref11","year":"2016","journal-title":"Verizone 2015 Protected Health Information Data Breach Report Figure 7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2006.09.015"},{"key":"ref12","first-page":"2458","article-title":"Biometrics based novel key distribution solution for body sensor networks","author":"miao","year":"2009","journal-title":"Proc Annu Int Conf IEEE Eng Med Biol Soc (EMBC)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.06.004"},{"key":"ref14","first-page":"17","article-title":"Health care as a complex adaptive system: Implications for design and management","volume":"38","author":"rouse","year":"2008","journal-title":"Bridge Washington Nat Acad Eng"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.1012332"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1317425.1317427"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379779"},{"key":"ref18","first-page":"4531","article-title":"Privacy preserving approaches in cloud: A survey","volume":"6","author":"neela","year":"2013","journal-title":"Indian J of Sci and Technol"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/s110504875"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9449-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-007-0017-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/sec.313"},{"key":"ref8","year":"2016","journal-title":"Verizone 2014 Data Breach Investigation Report Figure 19"},{"key":"ref7","article-title":"Enhancing information security in cloud computing services using SLA based metrics","author":"nia","year":"2011"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2011.148"},{"key":"ref9","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.04.003"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2011.5766466"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2314119"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416352"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2010.61"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTH.2008.4600120"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2009.12.001"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2009.06.004"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08089328.pdf?arnumber=8089328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:19Z","timestamp":1633921219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8089328\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2767561","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}